Impact
When the CONFIG_MEM_ALLOC_PROFILING_DEBUG option is enabled, a failure in the __memcg_slab_post_alloc_hook() routine can result in a missing free path for memory tags. The bug manifests as the kernel printing a warning that a tag was not cleared, which may subsequently appear on the next allocation. Although the warning alone does not provide remote code execution, it indicates an improper cleanup of memory tagging structures that could be leveraged by a local attacker to infer internal kernel state or to trigger undefined behavior in memory‑related code paths.
Affected Systems
All releases of the Linux kernel are affected, with explicit impact documented for kernel 6.19 release candidates rc1 through rc8. The generic cpe entry indicates that later kernel versions that have not yet integrated the fix are also susceptible until the patch is applied.
Risk and Exploitability
The CVSS score of 5.5 reflects a medium severity condition, and the EPSS score of less than 1 % suggests a very low probability of exploitation at the time of analysis. The vulnerability is not listed in CISA’s KEV catalog, meaning no known widespread attacks are reported. Attackers would require privileged or kernel‑level access to trigger the flaw; it does not appear exploitable via remote inputs or simple privilege escalation.
OpenCVE Enrichment
Debian DSA